In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc...In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.展开更多
Both, the dilemma to find a quantum field theory consistent with Einstein’s law of relativity and the problem to describe existing particles as bound states of matter has been solved by calculating bound state matrix...Both, the dilemma to find a quantum field theory consistent with Einstein’s law of relativity and the problem to describe existing particles as bound states of matter has been solved by calculating bound state matrix elements from a dual fermion-boson Lagrangian. In this formalism, the fermion binding energies are compensated by boson energies, indicating that particles can be generated out of the vacuum. This yields quantitative solutions for various mesons ω (0.78 GeV) - Υ (9.46 GeV) and all leptons e, μ and τ, with uncertainties in the extracted properties of less than 1‰. For transparency, a Web-page with the address htpps://h2909473.stratoserver.net has been constructed, where all calculations can be run on line and also the underlying fortran source code can be inspected.展开更多
A scheme is proposed to investigate the non-classical states generated by a quantum scissors device(QSD) operating on the the cavity mode of an optomechanical system. When the catalytic QSD acts on the cavity mode of ...A scheme is proposed to investigate the non-classical states generated by a quantum scissors device(QSD) operating on the the cavity mode of an optomechanical system. When the catalytic QSD acts on the cavity mode of the optomechanical system, the resulting state contains only the vacuum, single-photon and two-photon states depending upon the coupling parameter of the optomechanical system as well as the transmission coefficients of beam splitters(BSs). Especially, the output state is just a class of multicomponent cat state truncations at time t = 2π by choosing the appropriate value of coupling parameter. We discuss the success probability of such a state and the fidelity between the output state and input state via QSD. Then the linear entropy is used to investigate the entanglement between the two subsystems, finding that QSD operation can enhance their entanglement degree. Furthermore, we also derive the analytical expression of the Wigner function(WF) for the cavity mode via QSD and numerically analyze the WF distribution in phase space at time t =2π. These results show that the high non-classicality of output state can always be achieved by modulating the coupling parameter of the optomechanical system as well as the transmittance of BSs.展开更多
Efficient acquiring information from a quantum state is important for research in fundamental quantum physics and quantum information applications. Instead of using standard quantum state tomography method with recons...Efficient acquiring information from a quantum state is important for research in fundamental quantum physics and quantum information applications. Instead of using standard quantum state tomography method with reconstruction algorithm, weak values were proposed to directly measure density matrix elements of quantum state. Recently, similar to the concept of weak value, modular values were introduced to extend the direct measurement scheme to nonlocal quantum wavefunction. However, this method still involves approximations, which leads to inherent low precision. Here, we propose a new scheme which enables direct measurement for ideal value of the nonlocal density matrix element without taking approximations. Our scheme allows more accurate characterization of nonlocal quantum states, and therefore has greater advantages in practical measurement scenarios.展开更多
Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant...Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant system performance to deteriorate when data size is below 1010.In this work,an improved statistical fluctuation analysis method is applied for the first time to two decoy-states phase-matching quantum key distribution,offering a new insight and potential solutions for improving the key generation rate and the maximum transmission distance while maintaining security.Moreover,we also compare the influence of the proposed improved statistical fluctuation analysis method on system performance with those of the Gaussian approximation and Chernoff-Hoeffding boundary methods on system performance.The simulation results show that the proposed scheme significantly improves the key generation rate and maximum transmission distance in comparison with the Chernoff-Hoeffding approach,and approach the results obtained when the Gaussian approximation is employed.At the same time,the proposed scheme retains the same security level as the Chernoff-Hoeffding method,and is even more secure than the Gaussian approximation.展开更多
Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections...Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation.展开更多
To realize practical wide-area quantum communication,a satellite-to-ground network with partially entangled states is developed in this paper.For efficiency and security reasons,the existing method of quantum communic...To realize practical wide-area quantum communication,a satellite-to-ground network with partially entangled states is developed in this paper.For efficiency and security reasons,the existing method of quantum communication in distributed wireless quantum networks with partially entangled states cannot be applied directly to the proposed quantum network.Based on this point,an efficient and secure quantum communication scheme with partially entangled states is presented.In our scheme,the source node performs teleportation only after an end-to-end entangled state has been established by entanglement swapping with partially entangled states.Thus,the security of quantum communication is guaranteed.The destination node recovers the transmitted quantum bit with the help of an auxiliary quantum bit and specially defined unitary matrices.Detailed calculations and simulation analyses show that the probability of successfully transferring a quantum bit in the presented scheme is high.In addition,the auxiliary quantum bit provides a heralded mechanism for successful communication.Based on the critical components that are presented in this article an efficient,secure,and practical wide-area quantum communication can be achieved.展开更多
In this paper, we propose a controlled quantum state sharing scheme to share an arbitrary two-qubit state using a five-qubit cluster state and the Bell state measurement. In this scheme, the five-qubit cluster state i...In this paper, we propose a controlled quantum state sharing scheme to share an arbitrary two-qubit state using a five-qubit cluster state and the Bell state measurement. In this scheme, the five-qubit cluster state is shared by a sender (Alice), a controller (Charlie), and a receiver (Bob), and the sender only needs to perform the Bell-state measurements on her particles during the quantum state sharing process, the controller performs a single-qubit projective measurement on his particles, then the receiver can reconstruct the arbitrary two-qubit state by performing some appropriate unitary transformations on his particles after he has known the measured results of the sender and the controller.展开更多
This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 ...This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time.展开更多
We discuss a quantum remote state preparation protocol by which two parties, Alice and Candy, prepare a single-qubit and a two-qubit state, respectively, at the site of the receiver Bob. The single-qubit state is know...We discuss a quantum remote state preparation protocol by which two parties, Alice and Candy, prepare a single-qubit and a two-qubit state, respectively, at the site of the receiver Bob. The single-qubit state is known to Alice while the two-qubit state which is a non-maximally entangled Bell state is known to Candy. The three parties are connected through a single entangled state which acts as a quantum channel. We first describe the protocol in the ideal case when the entangled channel under use is in a pure state. After that, we consider the effect of amplitude damping(AD) noise on the quantum channel and describe the protocol executed through the noisy channel. The decrement of the fidelity is shown to occur with the increment in the noise parameter. This is shown by numerical computation in specific examples of the states to be created. Finally, we show that it is possible to maintain the label of fidelity to some extent and hence to decrease the effect of noise by the application of weak and reversal measurements. We also present a scheme for the generation of the five-qubit entangled resource which we require as a quantum channel. The generation scheme is run on the IBMQ platform.展开更多
Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle...Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle sequence to encode his/her voting content.The voters have multiple ballot items to choose rather than just binary options“yes”or“no”.After counting votes phase,any participant who is interested in voting results can obtain the voting results.To improve the efficiency of the traveling quantum anonymous voting scheme,an optimization method based on grouping strategy is also presented.Compared with the most existing traveling quantum voting schemes,the proposed scheme is more practical because of its privacy,verifiability and non-repeatability.Furthermore,the security analysis shows that the proposed traveling quantum anonymous voting scheme can prevent various attacks and ensure high security.展开更多
In cryptography,oblivious transfer(OT)is an important multiparty cryptographic primitive and protocol,that is suitable for many upperlayer applications,such as secure computation,remote coin-flipping,electrical contra...In cryptography,oblivious transfer(OT)is an important multiparty cryptographic primitive and protocol,that is suitable for many upperlayer applications,such as secure computation,remote coin-flipping,electrical contract signing and exchanging secrets simultaneously.However,some nogo theorems have been established,indicating that one-out-of-two quantum oblivious transfer(QOT)protocols with unconditional security are impossible.Fortunately,some one-out-of-two QOT protocols using the concept of Crepeau’s reduction have been demonstrated not to conform to Lo’s no-go theorem,but these protocols require more quantum resources to generate classical keys using all-or-nothing QOT to construct one-out-of-two QOT.This paper proposes a novel and efficient one-out-of-two QOT which uses quantum resources directly instead of wasting unnecessary resources to generate classical keys.The proposed protocol is not covered by Lo’s no-go theorem,and it is able to check the sender’s loyalty and avoid the attack from the receiver.Moreover,the entangled state of the proposed protocol is reusable,so it can provide more services for the participants when necessary.Compared with otherQOT protocols,the proposed protocol is more secure,efficient,and flexible,which not only can prevent external and internal attacks,but also reduce the required resources and resource distribution time.展开更多
Four intelligent optimization algorithms are compared by searching for control pulses to achieve the preparation of target quantum states for closed and open quantum systems, which include differential evolution(DE), ...Four intelligent optimization algorithms are compared by searching for control pulses to achieve the preparation of target quantum states for closed and open quantum systems, which include differential evolution(DE), particle swarm optimization(PSO), quantum-behaved particle swarm optimization(QPSO), and quantum evolutionary algorithm(QEA).We compare their control performance and point out their differences. By sampling and learning for uncertain quantum systems, the robustness of control pulses found by these four algorithms is also demonstrated and compared. The resulting research shows that the QPSO nearly outperforms the other three algorithms for all the performance criteria considered.This conclusion provides an important reference for solving complex quantum control problems by optimization algorithms and makes the QPSO be a powerful optimization tool.展开更多
Entanglement in quantum theory is a peculiar concept to scientists. With this concept we are forced to re-consider the cluster property which means that one event is irrelevant to another event when they are fully far...Entanglement in quantum theory is a peculiar concept to scientists. With this concept we are forced to re-consider the cluster property which means that one event is irrelevant to another event when they are fully far away. In the recent works we showed that the quasi-degenerate states induce the violation of cluster property in antiferromagnets when the continuous symmetry breaks spontaneously. We expect that the violation of cluster property will be observed in other materials too, because the spontaneous symmetry breaking is found in many systems such as the high temperature superconductors and the superfluidity. In order to examine the cluster property for these materials, we studied a quantum nonlinear sigma model with U(1) symmetry in the previous work. There we showed that the model does have quasi-degenerate states. In this paper we study the quantum nonlinear sigma model with SU(2) symmetry. In our approach we first define the quantum system on the lattice and then adopt the representation where the kinetic term is diagonalized. Since we have no definition on the conjugate variable to the angle variable, we use the angular momentum operators instead for the kinetic term. In this representation we introduce the states with the fixed quantum numbers and carry out numerical calculations using quantum Monte Carlo methods and other methods. Through analytical and numerical studies, we conclude that the energy of the quasi-degenerate state is proportional to the squared total angular momentum as well as to the inverse of the lattice size.展开更多
In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protoc...In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol,the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie's successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover,the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence(AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source.展开更多
In this paper the superpositions of two arbitrary coherent states |ψ〉 = α |β| + be^iψ |mβe^iδ〉 are constructed by using the superposition principle of quantum mechanics. The entropic squeezing effects of ...In this paper the superpositions of two arbitrary coherent states |ψ〉 = α |β| + be^iψ |mβe^iδ〉 are constructed by using the superposition principle of quantum mechanics. The entropic squeezing effects of the quantum states are studied. The numerical results indicate that the amplitudes, the ratio between the amplitudes of two coherent states, the phase difference between the two components and the relative phase of the two coefficients play important roles in the squeezing effects of the position entropy and momentum entropy.展开更多
In this paper, we focus on the space-inhomogeneous three-state on the one-dimension lattice, a one-phase model and a two-phase model include. By using the transfer matrices method by Endo et al., we calculate the stat...In this paper, we focus on the space-inhomogeneous three-state on the one-dimension lattice, a one-phase model and a two-phase model include. By using the transfer matrices method by Endo et al., we calculate the stationary measure for initial state concrete eigenvalue. Finally we found the transfer matrices method is more effective for the three-state quantum walks than the method obtained by Kawai et al.展开更多
This paper presents a scheme for probabilistic teleportation of an arbitrary GHZ-class state with a pure entangled two-particle quantum channel. The sender Alice first teleports the coefficients of the unknown state t...This paper presents a scheme for probabilistic teleportation of an arbitrary GHZ-class state with a pure entangled two-particle quantum channel. The sender Alice first teleports the coefficients of the unknown state to the receiver Bob, and then Bob reconstructs the state with an auxiliary particle and some unitary operations if the teleportation succeeds. This scheme has the advantage of transmitting much less particles for teleporting an arbitrary GHZ-class state than others. Moreover, it discusses the application of this scheme in quantum state sharing.展开更多
基金supported by the National Natural Science Foundation of China(Grant No.12301590)the Natural Science Foundation of Hebei Province(Grant No.A2022210002)。
文摘In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.
文摘Both, the dilemma to find a quantum field theory consistent with Einstein’s law of relativity and the problem to describe existing particles as bound states of matter has been solved by calculating bound state matrix elements from a dual fermion-boson Lagrangian. In this formalism, the fermion binding energies are compensated by boson energies, indicating that particles can be generated out of the vacuum. This yields quantitative solutions for various mesons ω (0.78 GeV) - Υ (9.46 GeV) and all leptons e, μ and τ, with uncertainties in the extracted properties of less than 1‰. For transparency, a Web-page with the address htpps://h2909473.stratoserver.net has been constructed, where all calculations can be run on line and also the underlying fortran source code can be inspected.
基金Project supported by the National Natural Science Foundation of China (Grant No.11704051)the Qinglan Project of the Jiangsu Education Department and the Research Foundation of Six Talents Peaks Project in Jiangsu Province,China (Grant No.XNY-093)。
文摘A scheme is proposed to investigate the non-classical states generated by a quantum scissors device(QSD) operating on the the cavity mode of an optomechanical system. When the catalytic QSD acts on the cavity mode of the optomechanical system, the resulting state contains only the vacuum, single-photon and two-photon states depending upon the coupling parameter of the optomechanical system as well as the transmission coefficients of beam splitters(BSs). Especially, the output state is just a class of multicomponent cat state truncations at time t = 2π by choosing the appropriate value of coupling parameter. We discuss the success probability of such a state and the fidelity between the output state and input state via QSD. Then the linear entropy is used to investigate the entanglement between the two subsystems, finding that QSD operation can enhance their entanglement degree. Furthermore, we also derive the analytical expression of the Wigner function(WF) for the cavity mode via QSD and numerically analyze the WF distribution in phase space at time t =2π. These results show that the high non-classicality of output state can always be achieved by modulating the coupling parameter of the optomechanical system as well as the transmittance of BSs.
基金Project supported by National Key Research and Development Program of China (Grant No. 2019YFA0705000)the National Natural Science Foundation of China (Grant No. 11974178)。
文摘Efficient acquiring information from a quantum state is important for research in fundamental quantum physics and quantum information applications. Instead of using standard quantum state tomography method with reconstruction algorithm, weak values were proposed to directly measure density matrix elements of quantum state. Recently, similar to the concept of weak value, modular values were introduced to extend the direct measurement scheme to nonlocal quantum wavefunction. However, this method still involves approximations, which leads to inherent low precision. Here, we propose a new scheme which enables direct measurement for ideal value of the nonlocal density matrix element without taking approximations. Our scheme allows more accurate characterization of nonlocal quantum states, and therefore has greater advantages in practical measurement scenarios.
文摘Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant system performance to deteriorate when data size is below 1010.In this work,an improved statistical fluctuation analysis method is applied for the first time to two decoy-states phase-matching quantum key distribution,offering a new insight and potential solutions for improving the key generation rate and the maximum transmission distance while maintaining security.Moreover,we also compare the influence of the proposed improved statistical fluctuation analysis method on system performance with those of the Gaussian approximation and Chernoff-Hoeffding boundary methods on system performance.The simulation results show that the proposed scheme significantly improves the key generation rate and maximum transmission distance in comparison with the Chernoff-Hoeffding approach,and approach the results obtained when the Gaussian approximation is employed.At the same time,the proposed scheme retains the same security level as the Chernoff-Hoeffding method,and is even more secure than the Gaussian approximation.
基金the National Key Research and Development Program of China(Grant No.2020YFA0309702)NSAF(Grant No.U2130205)+3 种基金the National Natural Science Foundation of China(Grant Nos.62101597,61605248,and 61505261)the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies。
文摘Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation.
基金Project supported by the National Natural Science Foundation of China (Grant No 60373059), the Doctoral Programs Foundation of the Ministry of Education of China (Grant No 20040013007), and the Major Research plan of the National Natural Science Foundation of China (Grant No 90604023).
基金supported by the National Natural Science Foundation of China(Grant Nos.61072067 and 61372076)the 111 Project(Grant No.B08038)+1 种基金the Fund from the State Key Laboratory of Integrated Services Networks(Grant No.ISN 1001004)the Fundamental Research Funds for the Central Universities(Grant Nos.K5051301059 and K5051201021)
文摘To realize practical wide-area quantum communication,a satellite-to-ground network with partially entangled states is developed in this paper.For efficiency and security reasons,the existing method of quantum communication in distributed wireless quantum networks with partially entangled states cannot be applied directly to the proposed quantum network.Based on this point,an efficient and secure quantum communication scheme with partially entangled states is presented.In our scheme,the source node performs teleportation only after an end-to-end entangled state has been established by entanglement swapping with partially entangled states.Thus,the security of quantum communication is guaranteed.The destination node recovers the transmitted quantum bit with the help of an auxiliary quantum bit and specially defined unitary matrices.Detailed calculations and simulation analyses show that the probability of successfully transferring a quantum bit in the presented scheme is high.In addition,the auxiliary quantum bit provides a heralded mechanism for successful communication.Based on the critical components that are presented in this article an efficient,secure,and practical wide-area quantum communication can be achieved.
基金Project supported by the National Natural Science Foundation of China (Grant No.10902083)the Natural Science Foundation of Shannxi Province,China (Grant No.2009JM1007)
文摘In this paper, we propose a controlled quantum state sharing scheme to share an arbitrary two-qubit state using a five-qubit cluster state and the Bell state measurement. In this scheme, the five-qubit cluster state is shared by a sender (Alice), a controller (Charlie), and a receiver (Bob), and the sender only needs to perform the Bell-state measurements on her particles during the quantum state sharing process, the controller performs a single-qubit projective measurement on his particles, then the receiver can reconstruct the arbitrary two-qubit state by performing some appropriate unitary transformations on his particles after he has known the measured results of the sender and the controller.
基金supported by the Key Program of the National Natural Science Foundation of China (Grant No. 90718007)the National Natural Science Foundation of China (Grant Nos. 60773135 and 60970140)
文摘This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time.
基金Project supported by Indian Institute of Engineering Science and Technology, Shibpur, India
文摘We discuss a quantum remote state preparation protocol by which two parties, Alice and Candy, prepare a single-qubit and a two-qubit state, respectively, at the site of the receiver Bob. The single-qubit state is known to Alice while the two-qubit state which is a non-maximally entangled Bell state is known to Candy. The three parties are connected through a single entangled state which acts as a quantum channel. We first describe the protocol in the ideal case when the entangled channel under use is in a pure state. After that, we consider the effect of amplitude damping(AD) noise on the quantum channel and describe the protocol executed through the noisy channel. The decrement of the fidelity is shown to occur with the increment in the noise parameter. This is shown by numerical computation in specific examples of the states to be created. Finally, we show that it is possible to maintain the label of fidelity to some extent and hence to decrease the effect of noise by the application of weak and reversal measurements. We also present a scheme for the generation of the five-qubit entangled resource which we require as a quantum channel. The generation scheme is run on the IBMQ platform.
基金supported by the Tang Scholar Project of Soochow Universitythe National Natural Science Foundation of China(Grant No.61873162)+1 种基金the Fund from Jiangsu Engineering Research Center of Novel Optical Fiber Technology and Communication NetworkSuzhou Key Laboratory of Advanced Optical Communication Network Technology。
文摘Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle sequence to encode his/her voting content.The voters have multiple ballot items to choose rather than just binary options“yes”or“no”.After counting votes phase,any participant who is interested in voting results can obtain the voting results.To improve the efficiency of the traveling quantum anonymous voting scheme,an optimization method based on grouping strategy is also presented.Compared with the most existing traveling quantum voting schemes,the proposed scheme is more practical because of its privacy,verifiability and non-repeatability.Furthermore,the security analysis shows that the proposed traveling quantum anonymous voting scheme can prevent various attacks and ensure high security.
基金supported in part by the Ministry of Science and Technology(MOST)in Taiwan under Grants MOST108-2638-E-002-002-MY2,MOST109-2222-E-005-002-MY3,MOST110-2627-M-002-002,MOST110-2221-E-260-014,MOST110-2222-E-006-011,MOST111-2218-E-005-007-MBK,and MOST111-2119-M-033-001supported in part by Higher Education Sprout Project,Ministry of Education to the Headquarters of University Advancement at National Cheng Kung University.
文摘In cryptography,oblivious transfer(OT)is an important multiparty cryptographic primitive and protocol,that is suitable for many upperlayer applications,such as secure computation,remote coin-flipping,electrical contract signing and exchanging secrets simultaneously.However,some nogo theorems have been established,indicating that one-out-of-two quantum oblivious transfer(QOT)protocols with unconditional security are impossible.Fortunately,some one-out-of-two QOT protocols using the concept of Crepeau’s reduction have been demonstrated not to conform to Lo’s no-go theorem,but these protocols require more quantum resources to generate classical keys using all-or-nothing QOT to construct one-out-of-two QOT.This paper proposes a novel and efficient one-out-of-two QOT which uses quantum resources directly instead of wasting unnecessary resources to generate classical keys.The proposed protocol is not covered by Lo’s no-go theorem,and it is able to check the sender’s loyalty and avoid the attack from the receiver.Moreover,the entangled state of the proposed protocol is reusable,so it can provide more services for the participants when necessary.Compared with otherQOT protocols,the proposed protocol is more secure,efficient,and flexible,which not only can prevent external and internal attacks,but also reduce the required resources and resource distribution time.
基金supported by the National Natural Science Foundation of China (Grant No. 61873251)。
文摘Four intelligent optimization algorithms are compared by searching for control pulses to achieve the preparation of target quantum states for closed and open quantum systems, which include differential evolution(DE), particle swarm optimization(PSO), quantum-behaved particle swarm optimization(QPSO), and quantum evolutionary algorithm(QEA).We compare their control performance and point out their differences. By sampling and learning for uncertain quantum systems, the robustness of control pulses found by these four algorithms is also demonstrated and compared. The resulting research shows that the QPSO nearly outperforms the other three algorithms for all the performance criteria considered.This conclusion provides an important reference for solving complex quantum control problems by optimization algorithms and makes the QPSO be a powerful optimization tool.
文摘Entanglement in quantum theory is a peculiar concept to scientists. With this concept we are forced to re-consider the cluster property which means that one event is irrelevant to another event when they are fully far away. In the recent works we showed that the quasi-degenerate states induce the violation of cluster property in antiferromagnets when the continuous symmetry breaks spontaneously. We expect that the violation of cluster property will be observed in other materials too, because the spontaneous symmetry breaking is found in many systems such as the high temperature superconductors and the superfluidity. In order to examine the cluster property for these materials, we studied a quantum nonlinear sigma model with U(1) symmetry in the previous work. There we showed that the model does have quasi-degenerate states. In this paper we study the quantum nonlinear sigma model with SU(2) symmetry. In our approach we first define the quantum system on the lattice and then adopt the representation where the kinetic term is diagonalized. Since we have no definition on the conjugate variable to the angle variable, we use the angular momentum operators instead for the kinetic term. In this representation we introduce the states with the fixed quantum numbers and carry out numerical calculations using quantum Monte Carlo methods and other methods. Through analytical and numerical studies, we conclude that the energy of the quasi-degenerate state is proportional to the squared total angular momentum as well as to the inverse of the lattice size.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61271238 and 61475075)the Specialized Research Fund for the Doctoral Program of Higher Education of China(Grant No.20123223110003)+7 种基金the Natural Science Research Foundation for Universities of Jiangsu Province of China(Grant No.11KJA510002)the Open Research Fund of Key Laboratory of Broadband Wireless Communication and Sensor Network TechnologyMinistry of EducationChina(Grant No.NYKL2015011)the Innovation Program of Graduate Education of Jiangsu ProvinceChina(Grant No.KYLX0810)partially supported by Qinglan Project of Jiangsu ProvinceChina
文摘In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol,the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie's successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover,the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence(AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source.
基金Project supported by the Natural Science Foundation of Fujian Province,China (Grant No T0650013)
文摘In this paper the superpositions of two arbitrary coherent states |ψ〉 = α |β| + be^iψ |mβe^iδ〉 are constructed by using the superposition principle of quantum mechanics. The entropic squeezing effects of the quantum states are studied. The numerical results indicate that the amplitudes, the ratio between the amplitudes of two coherent states, the phase difference between the two components and the relative phase of the two coefficients play important roles in the squeezing effects of the position entropy and momentum entropy.
文摘In this paper, we focus on the space-inhomogeneous three-state on the one-dimension lattice, a one-phase model and a two-phase model include. By using the transfer matrices method by Endo et al., we calculate the stationary measure for initial state concrete eigenvalue. Finally we found the transfer matrices method is more effective for the three-state quantum walks than the method obtained by Kawai et al.
基金Project supported by the National Natural Science Foundation of China (Grant Nos 10604008 and 10435020) and Beijing Education Committee (Grant No XK100270454).
文摘This paper presents a scheme for probabilistic teleportation of an arbitrary GHZ-class state with a pure entangled two-particle quantum channel. The sender Alice first teleports the coefficients of the unknown state to the receiver Bob, and then Bob reconstructs the state with an auxiliary particle and some unitary operations if the teleportation succeeds. This scheme has the advantage of transmitting much less particles for teleporting an arbitrary GHZ-class state than others. Moreover, it discusses the application of this scheme in quantum state sharing.
基金Project supported by the National Natural Science Foundation of China (Grant Nos 10604008 and 10435020) and the Beijing Education Committee (Grant No XK100270454).